General

  • Target

    6c912191a6853ca9717c37053a4ab7014d6980e48d846a8c777e7ee056cf4a56.zip

  • Size

    783KB

  • Sample

    221114-lf2r9sbb8t

  • MD5

    c7cf6c5d6a8583f658be17e73b48fd91

  • SHA1

    fd5bdfde138d38b38900ebc41697d33cfcd2f19f

  • SHA256

    4391d7c58d08abbf4acc9adeb82c455478473566e0d258ad9aae9cbaacb801ac

  • SHA512

    3cfd744e8939d0617e85c980033e790c9b3ae4c78ac218807201f31d2aa15d2036abcad790096fad096e06dafc4cb668e42e8db40dcbc93eb2c065194940ebf9

  • SSDEEP

    24576:boKLEtfIKhGjNllKRKUTrJ5Fin1CL8Wi0GDM8qyAgv:bZLKfICqrBirJ5Fi0L6lILzgv

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Targets

    • Target

      6c912191a6853ca9717c37053a4ab7014d6980e48d846a8c777e7ee056cf4a56.exe

    • Size

      852KB

    • MD5

      573b0103956eb1c9f12e2a2adcc77846

    • SHA1

      50e9fd321b9b1f39b6430b01941562ba924e40c0

    • SHA256

      6c912191a6853ca9717c37053a4ab7014d6980e48d846a8c777e7ee056cf4a56

    • SHA512

      ab26ac29ae7135cd6dcc5e95e6f9af290fadad9ab9afc87af60f38615a210a1a1d908d34e8796fe18108847b02cb51c1f6eb8f886237d1b0c8838edb5f4f9ef4

    • SSDEEP

      24576:OVwhMBsRpeiKuSbWY7XM970ZNmapxyJoyLJnM:OVw+XUSqH970Zwa1S

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks